Cryptographic protocol

Results: 1374



#Item
51Internet Standards / Secure Shell / Cryptographic software / OpenSSH / Internet protocols / Computer access control / FreeIPA / Password / Lightweight Directory Access Protocol / Generic Security Services Application Program Interface / Authentication

FreeIPA Training Series SSSD and OpenSSH Integration Jan Cholasta

Add to Reading List

Source URL: www.freeipa.org

Language: English - Date: 2013-06-06 07:16:17
52Transport Layer Security / Public-key cryptography / Key management / Public key infrastructure / Cryptographic protocols / Online Certificate Status Protocol / Revocation list / Certificate authority / X.509 / OCSP stapling / Revocation / Key

2016 IEEE European Symposium on Security and Privacy PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem Pawel Szalachowski, Laurent Chuat, and Adrian Perrig Department of Computer

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2016-04-19 10:06:03
53Public-key cryptography / Cryptography / Key management / Blind signature / Electronic voting / Financial cryptography / Digital signature / Blinding / RSA / Key / Cryptographic protocol / One-time pad

United States Patent] Chaum

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:08:14
54Secure communication / Internet Standards / Cryptographic protocols / Internet protocols / Internet security / Transport Layer Security / Cipher suite / RC4 / Transmission Control Protocol / Cryptography / Galois/Counter Mode / TLS-SRP

Network Working Group Request for Comments: 2246 Category: Standards Track T. Dierks Certicom

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:25:58
55Wireless networking / Wireless sensor network / Cryptographic protocols / Key management / Code division multiple access / Bootstrapping Server Function / Key distribution / Generic Bootstrapping Architecture / Authentication and Key Agreement / ZigBee / Lightweight Extensible Authentication Protocol / ANT

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-01-23 01:39:57
56Public-key cryptography / Cryptography / Secret sharing / Homeomorphisms / Homomorphic encryption / Cryptographic protocol / Digital signature / Communications protocol / Secure multi-party computation / Universal composability

LNCSPractical Private Information Aggregation in Large Networks

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:54:47
57Hypertext Transfer Protocol / Secure communication / Cryptographic protocols / Cryptographic software / Stunnel / Internet privacy / HTTPS / Load balancing / HTTP cookie

ALOHA LOAD BALANCER MANAGING SSL ON THE FRONTEND “APPNOTE” #0021 ― MANAGING SSL ON THE FRONTEND This application note is intended to help you implement SSL management on the frontend (connection to an HTTP server)

Add to Reading List

Source URL: www.haproxy.com

Language: English - Date: 2014-04-28 06:44:16
58Distributed data storage / Email / Internet privacy / Public key infrastructure / Pastry / Simple Mail Transfer Protocol / Distributed hash table / Secure messaging / Short Message Service / Public-key cryptography / Cryptographic hash function

POST: A Secure, Resilient, Cooperative Messaging System Alan Mislove1 Ansley Post1 Dan S. Wallach1

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2003-04-12 02:53:53
59Hypertext Transfer Protocol / Secure communication / Cryptographic protocols / Internet privacy / Cryptographic software / Stunnel / Load balancing / HTTPS / HTTP cookie

ALOHA LOAD BALANCER MANAGING SSL ON THE BACKEND “APPNOTE” #0022 ― MANAGING SSL ON THE BACKEND This application note is intended to help you implement SSL management on the backend (to encrypt data before connecting

Add to Reading List

Source URL: www.haproxy.com

Language: English - Date: 2014-04-28 06:44:16
60Routing protocols / Hashing / Error detection and correction / Routing algorithms / Distributed data storage / Hash chain / Routing / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Merkle tree / Cryptographic hash function / Distance-vector routing protocol

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:12
UPDATE